Security of Network and Applications
Jean-Marc THIRIET (
) and Denis LUBINEAU (
).
Objectives
The objective of this class is to introduce security principles, on the theoretical, organizational and technical aspects.
The points which are more specifically developed are: detection errors, firewall technics, network architecture, cryptology and VPN, anti-virus strategy. Are also discussed how to implement a security strategy, and some elements for the definition of a security policy.
Some elements about safe networks, or networks for safety or critical applications, are also studied.
Class schedule
Lesson |
Topic |
1 |
Introduction to networks, error detection and correction |
|
Bases of network, theoretical elements of error correction and detection, application in the case of parity, CRC, checksum. |
| DEPENDABILITY - SECURITY | |
2 |
Dependability - security - risk analysis |
|
Concepts, application to networks and information systems, simple application examples. |
| TECHNOLOGY FOR SECURITY | |
3 |
Attack strategies |
|
The phases of an attack, types of attacks. |
4 |
Technologies for security:
|
|
Network infrastructure, filtering, security protocols, VPN. |
| METHODOLOGIES | |
5 |
Cryptography |
|
Theories on symmetric and asymmetric cryptography, DES, RSA, application to encryption, hash calculation, signature, certificates. |
6 |
Virology |
|
Bases of virology. application to encryption, hash calculation, signature, certificates. |
| LABS on NETWORK AND SECURITY | |
Lab 1 |
Firewalls and wireless networks |
Lab 2 |
Communication security and encryption |
References
- S. Ghernaouti-Hélié, "Sécurité informatique et réseaux", Dunod, 2005.
- J. Steinberg & T. Speed, "SSL VPN, Understanding, evaluating and planning secure, web-based remote access", 2005.
- F. Halsall, "Computer networking and the internet", Addison Welseley, 2005.
Grading Policy
- Final Exam: 4/7
- Labs: 3/7
Handouts
Restricted access area